Virtual Events Archive

Sponsored by: Premio
Nov 10, 2020 4:15PM EDT (4 years ago)
The convergence of IT with vulnerable OT has exposed the inherent weaknesses that can result in attacks on the industrial IoT. Such vulnerabilities include poorly-secured industrial systems. AI/ML provides hyperintelligent cybersecurity and threat mitigation for platforms based on Industry 4.0. To d...
Sponsored by: Imagination Technologies
Nov 10, 2020 6:30PM EDT (4 years ago)
Devices are typically built for a specific application. The user manages the binding of the device to its cloud application through error prone manual processes. This cumbersome and risky approach prevents large-scale adoption. Single purpose devices add cost and complexity. It's an industry wide is...
Sponsored by: Data I/O
Nov 10, 2020 6:00PM EDT (4 years ago)
The connected and autonomous vehicles are driving new architectural designs to ECUs that connect various subsystems together and expose them to the outside world over various networks. These advancements increase the risk of threat actors gaining access to the subsystems. This session examines found...
Sponsored by: Veridify
Nov 10, 2020 6:00PM EDT (4 years ago)
We all know securing small devices in the IoT is hard, and the goal of many manufacturers is to secure and ‘manage’ a device from birth to retirement, creating even more security challenges. This talk will look at what makes securing low-resource IoT devices a challenge, with a specific focus on add...
Sponsored by: Kudelski Group
Nov 10, 2020 9:15PM EDT (4 years ago)
Protecting industrial equipment and technology from attacks and enabling new secure features and business models are critical to the success of IoT. But to do so requires careful, deliberate approaches to designing, running and sustaining robust security over time. What lessons can be learned from o...
Sponsored by: Wind River
Nov 10, 2020 9:00PM EDT (4 years ago)
Intelligent systems are notoriously hard to develop, and are becoming an ever-larger attack surface with their growing deployments in multi-layered architectures. Developers are struggling to respond to this increasing complexity, while being asked to deploy new technologies, such as AI, and staying...
Sponsored by: Sensory
Nov 10, 2020 9:30AM EDT (4 years ago)
Voice-enabled devices are everywhere. However, many of these devices today can be accessed and controlled by just about any user. There are obvious security risks associated with not limiting device access, especially when these devices are linked to various aspects of your business.
Sponsored by: Cisco
Nov 10, 2020 6:30PM EDT (4 years ago)
Protecting industrial operations against cyber threats is a very specific challenge. As more devices get connected with more remote access and new applications, the airgap between IT and OT networks erodes and the IDMZ is not sufficient.
Sponsored by: Blackberry QNX
Oct 27, 2020 11:00AM EDT (4 years, 1 month ago)
Hypervisors create virtual machines that are well-insulated from external corruption and allow mixed systems with different safety requirements to run on the same system-on-a-chip (SoC).  But virtualization is rarely straightforward. Your virtualized guest’s operating system may have limited configu...
Sponsored by: Infineon Technologies
Oct 21, 2020 11:00AM EDT (4 years, 1 month ago)
As wireless charging begins to see wider adoption due to its convenience, the need for security becomes even more critical. Designing security into wireless devices enables a safe, reliable and convenient way to charge electronic devices. It also prevents overheating, counterfeits and other safety c...
Sponsored by: Abaco, Elma, Pentek
Oct 08, 2020 2:00PM EDT (4 years, 1 month ago)
As military radar, signals intelligence (SIGINT) and electronic warfare systems get more complex so does the associated signal integrity challenges. These signal integrity concerns didn't even exist 10-15 years ago. Today as signal density for connectors continues to get tighter as footprints get sm...
Sponsored by: Intel IoT Solutions Alliance
Sep 29, 2020 11:00AM EDT (4 years, 1 month ago)
Digital transformation projects have accelerated in 2020, specifically using Telemetry and Video Analytics. Organizations are challenged with a wide variety of options and multi-vendor deployments that lead to delays and challenges. Arrow and ADLINK have teamed up with Microsoft to streamline deploy...
Sponsored by: Wind River
Sep 28, 2020 8:00AM EDT (4 years, 1 month ago)
Baking security into your system is not easy, but it must be done. Learn where to go to get the help you need to build a secure and safe device. 
Sponsored by: Wind River
Sep 27, 2020 8:00AM EDT (4 years, 2 months ago)
Securing your device or system is a complete lifecycle effort. Threats must be actively monitored and resolutions must be implemented. Learn why proactive endpoint integrity monitoring is a must in today’s interconnected world.
Sponsored by: Wind River
Sep 26, 2020 8:00AM EDT (4 years, 2 months ago)
You must anticipate that a breach will happen. Learn to model different threat scenarios and put in place mechanisms to protect your applications, data, IP, and the resiliency of the device. Your threat model should assume that an attacker will get root (admin) access. 
Sponsored by: Wind River
Sep 25, 2020 8:00AM EDT (4 years, 2 months ago)
Your device is only as secure as its weakest link, so you must build on top of a proven and trusted platform with hardware-based security features as well as trustworthy software vendors, code pedigree, and secure software development practices.
Sponsored by: Wind River
Sep 24, 2020 8:00AM EDT (4 years, 2 months ago)
Building your security policy starts with determining the device’s assets, identifying threats to those assets, and defining mitigations to those threats. Your policy has to factor in your risk tolerance as you determine which mitigations to implement.
Sponsored by: Wind River
Sep 23, 2020 8:00AM EDT (4 years, 2 months ago)
Planning for security requirements up front greatly reduces friction and cost throughout development and deployment. Learn how they will influence the direction your project takes, and what you will need to prove you’ve met them.
Sponsored by: Advantech Europe
Sep 22, 2020 2:00PM EDT (4 years, 2 months ago)
Embedded Single Boards are the solutions-to-go to meet high performance IoT demands. Don't compromise for performance & board size: learn how to easily migrate actual and future application demands like Artificial Intelligence of Things and 5G connectivity using our tailored system approach with ou...
Sponsored by: IAR Systems
Sep 02, 2020 11:00AM EDT (4 years, 2 months ago)
System security often starts with a secure boot process, which is managed by the Secure Boot Manager, which lives alongside the provisioning of secure keys and certificates, to provide a robust root of trust. If your system does not deploy a secure boot mechanism, you’re clearly opening yourself up...
Sponsored by: IAR Systems
Aug 26, 2020 11:00AM EDT (4 years, 3 months ago)
Secure Provisioning involves defining a key infrastructure during the development process to dynamically generate secure keys, then insert those keys into the device along with a cryptographically secured application image. That process sounds complex, but it needn’t be if you follow a step-by-step...
Sponsored by: IAR Systems
Aug 19, 2020 11:00AM EDT (4 years, 3 months ago)
Secure contexts define the configuration of the trusted execution environment and ensure that minimum standards of authentication and confidentiality are met. In many cases, APIs are only accessible via a secure context. This is a method of ensuring that your embedded code remains secure and out of...
Sponsored by: Advantech
Aug 18, 2020 2:00PM EDT (4 years, 3 months ago)
AI is transforming industries like manufacturing, retail, smart cities, transportation, healthcare and more. Applications are moving towards edge computing to enable real-time decision making without the limitations of latency, cost, bandwidth, and power consumption. This trend has led to a rapid in...
Sponsored by: IAR Systems
Aug 12, 2020 11:00AM EDT (4 years, 3 months ago)
Your IP is essentially the crown jewels of your design, if not your entire company. Hence, it’s vital to ensure that it remains secure. However, it’s not always obvious where the weak link in your protection chain resides. And there’s far more to it than the old adage of “monitor, detect, and respon...
Sponsored by: IAR Systems
Aug 05, 2020 11:00AM EDT (4 years, 3 months ago)
Depending on your geography, or more specifically, the intended geography for your embedded design, the rules surrounding security may be different than other geographies. Different governments and other legislative bodies are continually changing the rules of the game. And again, depending on your...